Loading [MathJax]/extensions/MathMenu.js
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech | IEEE Conference Publication | IEEE Xplore

Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech


Abstract:

Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on s...Show More

Abstract:

Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks using telephone speech. We implemented a voice conversion systems with two types of features and nonparallel frame alignment methods and five speaker verification systems ranging from simple Gaussian mixture models (GMMs) to state-of-the-art joint factor analysis (JFA) recognizer. Experiments on a subset of NIST 2006 SRE corpus indicate that the JFA method is most resilient against conversion attacks. But even it experiences more than 5-fold increase in the false acceptance rate from 3.24 % to 17.33 %.
Date of Conference: 25-30 March 2012
Date Added to IEEE Xplore: 30 August 2012
ISBN Information:

ISSN Information:

Conference Location: Kyoto, Japan

Contact IEEE to Subscribe

References

References is not available for this document.